Detecting Data Injection Attacks in ROS Systems using Machine Learning

被引:1
|
作者
Antunes, Rodrigo Abrantes [1 ]
Dalmazo, Bruno L. [1 ]
Drews-Jr, Paulo L. J. [1 ]
机构
[1] Univ Fed Rio Grande, Ctr Ciencias Comp, Rio Grande, Brazil
关键词
D O I
10.1109/LARS/SBR/WRE56824.2022.9995917
中图分类号
TP24 [机器人技术];
学科分类号
080202 ; 1405 ;
摘要
In recent decades, there have been numerous technological advances that have allowed robots to share more and more space with humans. However, these systems are built on top of traditional computing platforms and are susceptible to the same cyber-attacks. In addition, they also introduce a new set of security issues that can result in a breach of privacy or even physical harm. In this context, a new generation of robotics software has gained momentum. The Robot Operating System (ROS) is one of the most popular frameworks for robot researchers and developers. However, several studies have shown that it brings vulnerabilities that can compromise its security and reliability. This work aims to evaluate the application of anomalybased intrusion detection techniques to recognize data injection attacks. A model was proposed using the support vector machine (SVM) algorithm, which was trained from the network traffic characteristics of a ROS application. Results obtained through experiments conducted in a simulated environment demonstrated an accuracy of about 92% in the detection of these attacks.
引用
收藏
页码:223 / 228
页数:6
相关论文
共 50 条
  • [41] Accurate Detection of False Data Injection Attacks in Renewable Power Systems Using Deep Learning
    Almutairy, Fayha
    Scekic, Lazar
    Elmoudi, Ramadan
    Wshah, Safwan
    IEEE ACCESS, 2021, 9 : 135774 - 135789
  • [42] Detecting SQL Injection Web Attacks Using Ensemble Learners and Data Sampling
    Zuech, Richard
    Hancock, John
    Khoshgoftaar, Taghi M.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 27 - 34
  • [43] Detecting Blind Cross-Site Scripting Attacks Using Machine Learning
    Kaur, Gurpreet
    Malik, Yasir
    Samuel, Hamman
    Jaafar, Fehmi
    2018 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MACHINE LEARNING (SPML 2018), 2018, : 22 - 25
  • [44] A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning
    Das, Saikat
    Venugopal, Deepak
    Shiva, Sajjan
    ADVANCES IN INFORMATION AND COMMUNICATION, VOL 2, 2020, 1130 : 721 - 738
  • [45] A Test Bed for Detecting False Data Injection Attacks in Systems With Distributed Energy Resources
    Albunashee, Hamdi M.
    Farnell, Chris
    Suchanek, Andrew
    Haulmark, Kelby
    McCann, Roy A.
    Di, Jia
    Mantooth, Alan
    IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, 2022, 10 (01) : 1303 - 1315
  • [46] Detecting DDoS Attacks in SDN using a Hybrid Method with Entropy and Machine Learning
    Santos-Neto, Marcos J.
    Bordim, Jacir L.
    Alchieri, Eduardo A. P.
    Ishikawa, Edison
    Dourado, Leonardo S.
    2022 TENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS, CANDARW, 2022, : 248 - 254
  • [47] Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems
    Lakshminarayana, Subhash
    Teng, Teo Zhan
    Tan, Rui
    Yau, David K. Y.
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2018, 2 (04)
  • [48] Detecting False Data Injection Attacks (FDIAs) in Power Systems Based on Entropy Criteria
    Liu X.
    Zhang Y.
    Wang Z.
    Du H.
    Zhou J.
    Liu Y.
    Peng J.
    Journal of The Institution of Engineers (India): Series B, 2024, 105 (01) : 121 - 129
  • [49] Machine Learning for Detecting Security Attacks on Blockchain using Software Defined Networking
    Gaba, Shivani
    Budhiraja, Ishan
    Makkar, Aaisha
    Garg, Deepak
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 260 - 264
  • [50] Detecting Injection Attacks in Linear Time Invariant Systems
    Loh, Peter
    Sabaliauskaite, Giedre
    Mathur, Aditya
    PROCEEDINGS OF THE 2013 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (CIS), 2013, : 84 - 89